Securing Your Computer System
Title:
Securing Your Computer System
Word Count:
486
Summary:
Today, more and more people are using their computers for everything from communication to onl
Keywords:
computer security, virus, trojan, worm, spyware
Article Body:
Today, more and more people are using their computers for everything from communication to onl
1. Always make backups of important information and store in a safe place separate from your c
2. Update and patch your operating system, web browser and software frequently. If you have a
3. Install a firewall. Without a good firewall, viruses, worms, Trojans, malware and adware ca
4. Review your browser and email settings for optimum security. Why should you do this? Active
5. Install antivirus software and set for automatic updates so that you receive the most curre
6. Do not open unknown email attachments. It is simply not enough that you may recognize the a
7. Do not run programs from unknown origins. Also, do not send these types of programs to frie
8. Disable hidden filename extensions. By default, the Windows operating system is set to ˆhid
9. Turn off your computer and disconnect from the network when not using the computer. A hacke
10. Consider making a boot disk on a floppy disk in case your computer is damaged or compromis
This is a demo version of txt2pdf v.10.1
Developed by SANFACE Software http://www.sanface.com/
Available at http://www.sanface.com/txt2pdf.html
Securing Your Computer System
Word Count:
486
Summary:
Today, more and more people are using their computers for everything from communication to onl
Keywords:
computer security, virus, trojan, worm, spyware
Article Body:
Today, more and more people are using their computers for everything from communication to onl
1. Always make backups of important information and store in a safe place separate from your c
2. Update and patch your operating system, web browser and software frequently. If you have a
3. Install a firewall. Without a good firewall, viruses, worms, Trojans, malware and adware ca
4. Review your browser and email settings for optimum security. Why should you do this? Active
5. Install antivirus software and set for automatic updates so that you receive the most curre
6. Do not open unknown email attachments. It is simply not enough that you may recognize the a
7. Do not run programs from unknown origins. Also, do not send these types of programs to frie
8. Disable hidden filename extensions. By default, the Windows operating system is set to ˆhid
9. Turn off your computer and disconnect from the network when not using the computer. A hacke
10. Consider making a boot disk on a floppy disk in case your computer is damaged or compromis
This is a demo version of txt2pdf v.10.1
Developed by SANFACE Software http://www.sanface.com/
Available at http://www.sanface.com/txt2pdf.html